CS290N Extra-Performance Computer Architecture
Prof. Fred Chong
SQ 2006
Problem Set 4 (XOM - Bita Mazloom)
Problem_1. What are the basic and external instructions of the
abstract XOM machine?
Problem_2. What are the three types of attacks that might cause a XOM
machine to leak information?
Problem_3. What types of exploits is a XOM machine not designed to
protect against?
Problem_4. Why did the author's of XOM decide to include the L1 anf L2
caches in the boundary of the XOM machine and what are the pros and
cons of this strategy?